<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-06T09:27:21.210Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:7779" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:7779</identifier>
                <datestamp>2020-12-13T14:45:39Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Anomalies Detection in the Application Logs Using Kohonen SOM Machine Learning Algorithm</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2020</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/7779</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://portal.sinteza.singidunum.ac.rs/Media/files/2020/275-282.pdf</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:31561" confidence="-1">V. Marković</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-8682-7014" confidence="-1">A. NJeguš</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-9928-6269" confidence="-1">М. Марјановић-Јаковљевић</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Internal fraud in the financial sector is difficult to detect since fraudulent transactions are indistinguishable from ordinary transactions, and standard checkpoints, in the form of transaction documentation and authorization, are skillfully avoided. Well-designed software has available and machine-readable application logs that can be analyzed to detect anomalies in application usage. This paper presents a data preparation technique using path analysis and Kohonen SOM clustering algorithm that can help better profile users of an application to reduce the number of cases that will be further investigated.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">275</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">282</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">doi:10.15308/Sinteza-2020-275-282</dim:field>
                    <dim:field mdschema="dc" element="source">Proc. of International Scientific Conference on Information Technology and Data related research</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
